#include <string.h>
#include <openssl/opensslconf.h>
#include <openssl/sm3.h>
#include "crypto_internal.h"
CTASSERT(sizeof(SM3_WORD) == sizeof(uint32_t));
#ifndef OPENSSL_NO_SM3
#define P0(X) (X ^ crypto_rol_u32(X, 9) ^ crypto_rol_u32(X, 17))
#define P1(X) (X ^ crypto_rol_u32(X, 15) ^ crypto_rol_u32(X, 23))
#define FF0(X, Y, Z) (X ^ Y ^ Z)
#define GG0(X, Y, Z) (X ^ Y ^ Z)
#define FF1(X, Y, Z) ((X & Y) | ((X | Y) & Z))
#define GG1(X, Y, Z) ((Z ^ (X & (Y ^ Z))))
#define EXPAND(W0, W7, W13, W3, W10) \
(P1(W0 ^ W7 ^ crypto_rol_u32(W13, 15)) ^ crypto_rol_u32(W3, 7) ^ W10)
#define ROUND(A, B, C, D, E, F, G, H, TJ, Wi, Wj, FF, GG) do { \
const SM3_WORD A12 = crypto_rol_u32(A, 12); \
const SM3_WORD A12_SM = A12 + E + TJ; \
const SM3_WORD SS1 = crypto_rol_u32(A12_SM, 7); \
const SM3_WORD TT1 = FF(A, B, C) + D + (SS1 ^ A12) + (Wj); \
const SM3_WORD TT2 = GG(E, F, G) + H + SS1 + Wi; \
B = crypto_rol_u32(B, 9); \
D = TT1; \
F = crypto_rol_u32(F, 19); \
H = P0(TT2); \
} while(0)
#define R1(A, B, C, D, E, F, G, H, TJ, Wi, Wj) \
ROUND(A, B, C, D, E, F, G, H, TJ, Wi, Wj, FF0, GG0)
#define R2(A, B, C, D, E, F, G, H, TJ, Wi, Wj) \
ROUND(A, B, C, D, E, F, G, H, TJ, Wi, Wj, FF1, GG1)
static void
sm3_block_data_order(SM3_CTX *ctx, const void *_in, size_t num)
{
const uint8_t *in = _in;
const SM3_WORD *in32;
SM3_WORD A, B, C, D, E, F, G, H;
SM3_WORD W00, W01, W02, W03, W04, W05, W06, W07;
SM3_WORD W08, W09, W10, W11, W12, W13, W14, W15;
while (num-- != 0) {
A = ctx->A;
B = ctx->B;
C = ctx->C;
D = ctx->D;
E = ctx->E;
F = ctx->F;
G = ctx->G;
H = ctx->H;
if ((uintptr_t)in % 4 == 0) {
in32 = (const SM3_WORD *)in;
W00 = be32toh(in32[0]);
W01 = be32toh(in32[1]);
W02 = be32toh(in32[2]);
W03 = be32toh(in32[3]);
W04 = be32toh(in32[4]);
W05 = be32toh(in32[5]);
W06 = be32toh(in32[6]);
W07 = be32toh(in32[7]);
W08 = be32toh(in32[8]);
W09 = be32toh(in32[9]);
W10 = be32toh(in32[10]);
W11 = be32toh(in32[11]);
W12 = be32toh(in32[12]);
W13 = be32toh(in32[13]);
W14 = be32toh(in32[14]);
W15 = be32toh(in32[15]);
} else {
W00 = crypto_load_be32toh(&in[0 * 4]);
W01 = crypto_load_be32toh(&in[1 * 4]);
W02 = crypto_load_be32toh(&in[2 * 4]);
W03 = crypto_load_be32toh(&in[3 * 4]);
W04 = crypto_load_be32toh(&in[4 * 4]);
W05 = crypto_load_be32toh(&in[5 * 4]);
W06 = crypto_load_be32toh(&in[6 * 4]);
W07 = crypto_load_be32toh(&in[7 * 4]);
W08 = crypto_load_be32toh(&in[8 * 4]);
W09 = crypto_load_be32toh(&in[9 * 4]);
W10 = crypto_load_be32toh(&in[10 * 4]);
W11 = crypto_load_be32toh(&in[11 * 4]);
W12 = crypto_load_be32toh(&in[12 * 4]);
W13 = crypto_load_be32toh(&in[13 * 4]);
W14 = crypto_load_be32toh(&in[14 * 4]);
W15 = crypto_load_be32toh(&in[15 * 4]);
}
in += SM3_CBLOCK;
R1(A, B, C, D, E, F, G, H, 0x79cc4519, W00, W00 ^ W04);
W00 = EXPAND(W00, W07, W13, W03, W10);
R1(D, A, B, C, H, E, F, G, 0xf3988a32, W01, W01 ^ W05);
W01 = EXPAND(W01, W08, W14, W04, W11);
R1(C, D, A, B, G, H, E, F, 0xe7311465, W02, W02 ^ W06);
W02 = EXPAND(W02, W09, W15, W05, W12);
R1(B, C, D, A, F, G, H, E, 0xce6228cb, W03, W03 ^ W07);
W03 = EXPAND(W03, W10, W00, W06, W13);
R1(A, B, C, D, E, F, G, H, 0x9cc45197, W04, W04 ^ W08);
W04 = EXPAND(W04, W11, W01, W07, W14);
R1(D, A, B, C, H, E, F, G, 0x3988a32f, W05, W05 ^ W09);
W05 = EXPAND(W05, W12, W02, W08, W15);
R1(C, D, A, B, G, H, E, F, 0x7311465e, W06, W06 ^ W10);
W06 = EXPAND(W06, W13, W03, W09, W00);
R1(B, C, D, A, F, G, H, E, 0xe6228cbc, W07, W07 ^ W11);
W07 = EXPAND(W07, W14, W04, W10, W01);
R1(A, B, C, D, E, F, G, H, 0xcc451979, W08, W08 ^ W12);
W08 = EXPAND(W08, W15, W05, W11, W02);
R1(D, A, B, C, H, E, F, G, 0x988a32f3, W09, W09 ^ W13);
W09 = EXPAND(W09, W00, W06, W12, W03);
R1(C, D, A, B, G, H, E, F, 0x311465e7, W10, W10 ^ W14);
W10 = EXPAND(W10, W01, W07, W13, W04);
R1(B, C, D, A, F, G, H, E, 0x6228cbce, W11, W11 ^ W15);
W11 = EXPAND(W11, W02, W08, W14, W05);
R1(A, B, C, D, E, F, G, H, 0xc451979c, W12, W12 ^ W00);
W12 = EXPAND(W12, W03, W09, W15, W06);
R1(D, A, B, C, H, E, F, G, 0x88a32f39, W13, W13 ^ W01);
W13 = EXPAND(W13, W04, W10, W00, W07);
R1(C, D, A, B, G, H, E, F, 0x11465e73, W14, W14 ^ W02);
W14 = EXPAND(W14, W05, W11, W01, W08);
R1(B, C, D, A, F, G, H, E, 0x228cbce6, W15, W15 ^ W03);
W15 = EXPAND(W15, W06, W12, W02, W09);
R2(A, B, C, D, E, F, G, H, 0x9d8a7a87, W00, W00 ^ W04);
W00 = EXPAND(W00, W07, W13, W03, W10);
R2(D, A, B, C, H, E, F, G, 0x3b14f50f, W01, W01 ^ W05);
W01 = EXPAND(W01, W08, W14, W04, W11);
R2(C, D, A, B, G, H, E, F, 0x7629ea1e, W02, W02 ^ W06);
W02 = EXPAND(W02, W09, W15, W05, W12);
R2(B, C, D, A, F, G, H, E, 0xec53d43c, W03, W03 ^ W07);
W03 = EXPAND(W03, W10, W00, W06, W13);
R2(A, B, C, D, E, F, G, H, 0xd8a7a879, W04, W04 ^ W08);
W04 = EXPAND(W04, W11, W01, W07, W14);
R2(D, A, B, C, H, E, F, G, 0xb14f50f3, W05, W05 ^ W09);
W05 = EXPAND(W05, W12, W02, W08, W15);
R2(C, D, A, B, G, H, E, F, 0x629ea1e7, W06, W06 ^ W10);
W06 = EXPAND(W06, W13, W03, W09, W00);
R2(B, C, D, A, F, G, H, E, 0xc53d43ce, W07, W07 ^ W11);
W07 = EXPAND(W07, W14, W04, W10, W01);
R2(A, B, C, D, E, F, G, H, 0x8a7a879d, W08, W08 ^ W12);
W08 = EXPAND(W08, W15, W05, W11, W02);
R2(D, A, B, C, H, E, F, G, 0x14f50f3b, W09, W09 ^ W13);
W09 = EXPAND(W09, W00, W06, W12, W03);
R2(C, D, A, B, G, H, E, F, 0x29ea1e76, W10, W10 ^ W14);
W10 = EXPAND(W10, W01, W07, W13, W04);
R2(B, C, D, A, F, G, H, E, 0x53d43cec, W11, W11 ^ W15);
W11 = EXPAND(W11, W02, W08, W14, W05);
R2(A, B, C, D, E, F, G, H, 0xa7a879d8, W12, W12 ^ W00);
W12 = EXPAND(W12, W03, W09, W15, W06);
R2(D, A, B, C, H, E, F, G, 0x4f50f3b1, W13, W13 ^ W01);
W13 = EXPAND(W13, W04, W10, W00, W07);
R2(C, D, A, B, G, H, E, F, 0x9ea1e762, W14, W14 ^ W02);
W14 = EXPAND(W14, W05, W11, W01, W08);
R2(B, C, D, A, F, G, H, E, 0x3d43cec5, W15, W15 ^ W03);
W15 = EXPAND(W15, W06, W12, W02, W09);
R2(A, B, C, D, E, F, G, H, 0x7a879d8a, W00, W00 ^ W04);
W00 = EXPAND(W00, W07, W13, W03, W10);
R2(D, A, B, C, H, E, F, G, 0xf50f3b14, W01, W01 ^ W05);
W01 = EXPAND(W01, W08, W14, W04, W11);
R2(C, D, A, B, G, H, E, F, 0xea1e7629, W02, W02 ^ W06);
W02 = EXPAND(W02, W09, W15, W05, W12);
R2(B, C, D, A, F, G, H, E, 0xd43cec53, W03, W03 ^ W07);
W03 = EXPAND(W03, W10, W00, W06, W13);
R2(A, B, C, D, E, F, G, H, 0xa879d8a7, W04, W04 ^ W08);
W04 = EXPAND(W04, W11, W01, W07, W14);
R2(D, A, B, C, H, E, F, G, 0x50f3b14f, W05, W05 ^ W09);
W05 = EXPAND(W05, W12, W02, W08, W15);
R2(C, D, A, B, G, H, E, F, 0xa1e7629e, W06, W06 ^ W10);
W06 = EXPAND(W06, W13, W03, W09, W00);
R2(B, C, D, A, F, G, H, E, 0x43cec53d, W07, W07 ^ W11);
W07 = EXPAND(W07, W14, W04, W10, W01);
R2(A, B, C, D, E, F, G, H, 0x879d8a7a, W08, W08 ^ W12);
W08 = EXPAND(W08, W15, W05, W11, W02);
R2(D, A, B, C, H, E, F, G, 0x0f3b14f5, W09, W09 ^ W13);
W09 = EXPAND(W09, W00, W06, W12, W03);
R2(C, D, A, B, G, H, E, F, 0x1e7629ea, W10, W10 ^ W14);
W10 = EXPAND(W10, W01, W07, W13, W04);
R2(B, C, D, A, F, G, H, E, 0x3cec53d4, W11, W11 ^ W15);
W11 = EXPAND(W11, W02, W08, W14, W05);
R2(A, B, C, D, E, F, G, H, 0x79d8a7a8, W12, W12 ^ W00);
W12 = EXPAND(W12, W03, W09, W15, W06);
R2(D, A, B, C, H, E, F, G, 0xf3b14f50, W13, W13 ^ W01);
W13 = EXPAND(W13, W04, W10, W00, W07);
R2(C, D, A, B, G, H, E, F, 0xe7629ea1, W14, W14 ^ W02);
W14 = EXPAND(W14, W05, W11, W01, W08);
R2(B, C, D, A, F, G, H, E, 0xcec53d43, W15, W15 ^ W03);
W15 = EXPAND(W15, W06, W12, W02, W09);
R2(A, B, C, D, E, F, G, H, 0x9d8a7a87, W00, W00 ^ W04);
W00 = EXPAND(W00, W07, W13, W03, W10);
R2(D, A, B, C, H, E, F, G, 0x3b14f50f, W01, W01 ^ W05);
W01 = EXPAND(W01, W08, W14, W04, W11);
R2(C, D, A, B, G, H, E, F, 0x7629ea1e, W02, W02 ^ W06);
W02 = EXPAND(W02, W09, W15, W05, W12);
R2(B, C, D, A, F, G, H, E, 0xec53d43c, W03, W03 ^ W07);
W03 = EXPAND(W03, W10, W00, W06, W13);
R2(A, B, C, D, E, F, G, H, 0xd8a7a879, W04, W04 ^ W08);
R2(D, A, B, C, H, E, F, G, 0xb14f50f3, W05, W05 ^ W09);
R2(C, D, A, B, G, H, E, F, 0x629ea1e7, W06, W06 ^ W10);
R2(B, C, D, A, F, G, H, E, 0xc53d43ce, W07, W07 ^ W11);
R2(A, B, C, D, E, F, G, H, 0x8a7a879d, W08, W08 ^ W12);
R2(D, A, B, C, H, E, F, G, 0x14f50f3b, W09, W09 ^ W13);
R2(C, D, A, B, G, H, E, F, 0x29ea1e76, W10, W10 ^ W14);
R2(B, C, D, A, F, G, H, E, 0x53d43cec, W11, W11 ^ W15);
R2(A, B, C, D, E, F, G, H, 0xa7a879d8, W12, W12 ^ W00);
R2(D, A, B, C, H, E, F, G, 0x4f50f3b1, W13, W13 ^ W01);
R2(C, D, A, B, G, H, E, F, 0x9ea1e762, W14, W14 ^ W02);
R2(B, C, D, A, F, G, H, E, 0x3d43cec5, W15, W15 ^ W03);
ctx->A ^= A;
ctx->B ^= B;
ctx->C ^= C;
ctx->D ^= D;
ctx->E ^= E;
ctx->F ^= F;
ctx->G ^= G;
ctx->H ^= H;
}
}
int
SM3_Init(SM3_CTX *c)
{
memset(c, 0, sizeof(*c));
c->A = 0x7380166fUL;
c->B = 0x4914b2b9UL;
c->C = 0x172442d7UL;
c->D = 0xda8a0600UL;
c->E = 0xa96f30bcUL;
c->F = 0x163138aaUL;
c->G = 0xe38dee4dUL;
c->H = 0xb0fb0e4eUL;
return 1;
}
LCRYPTO_ALIAS(SM3_Init);
int
SM3_Update(SM3_CTX *c, const void *data_, size_t len)
{
const unsigned char *data = data_;
unsigned char *p;
SM3_WORD l;
size_t n;
if (len == 0)
return 1;
l = (c->Nl + (((SM3_WORD)len) << 3))&0xffffffffUL;
if (l < c->Nl)
c->Nh++;
c->Nh+=(SM3_WORD)(len>>29);
c->Nl = l;
n = c->num;
if (n != 0) {
p = (unsigned char *)c->data;
if (len >= SM3_CBLOCK || len + n >= SM3_CBLOCK) {
memcpy(p + n, data, SM3_CBLOCK - n);
sm3_block_data_order(c, p, 1);
n = SM3_CBLOCK - n;
data += n;
len -= n;
c->num = 0;
memset(p, 0, SM3_CBLOCK);
} else {
memcpy(p + n, data, len);
c->num += (unsigned int)len;
return 1;
}
}
n = len / SM3_CBLOCK;
if (n > 0) {
sm3_block_data_order(c, data, n);
n *= SM3_CBLOCK;
data += n;
len -= n;
}
if (len != 0) {
p = (unsigned char *)c->data;
c->num = (unsigned int)len;
memcpy(p, data, len);
}
return 1;
}
LCRYPTO_ALIAS(SM3_Update);
int
SM3_Final(unsigned char *md, SM3_CTX *c)
{
unsigned char *p = (unsigned char *)c->data;
size_t n = c->num;
p[n] = 0x80;
n++;
if (n > (SM3_CBLOCK - 8)) {
memset(p + n, 0, SM3_CBLOCK - n);
n = 0;
sm3_block_data_order(c, p, 1);
}
memset(p + n, 0, SM3_CBLOCK - 8 - n);
c->data[SM3_LBLOCK - 2] = htobe32(c->Nh);
c->data[SM3_LBLOCK - 1] = htobe32(c->Nl);
sm3_block_data_order(c, p, 1);
c->num = 0;
memset(p, 0, SM3_CBLOCK);
crypto_store_htobe32(&md[0 * 4], c->A);
crypto_store_htobe32(&md[1 * 4], c->B);
crypto_store_htobe32(&md[2 * 4], c->C);
crypto_store_htobe32(&md[3 * 4], c->D);
crypto_store_htobe32(&md[4 * 4], c->E);
crypto_store_htobe32(&md[5 * 4], c->F);
crypto_store_htobe32(&md[6 * 4], c->G);
crypto_store_htobe32(&md[7 * 4], c->H);
return 1;
}
LCRYPTO_ALIAS(SM3_Final);
#endif